I don’t know if this will help anyone in their first place, but I was just setting a family member up with Comcast (only choice) - remember that:
1) you get gouged if you don’t buy your own cable modem
2) you should be calling to (politely) negotiate a new contract annually
I don’t know, here are some other Auntie Lesley tips everyone assumes you already know:
1) adding people onto a family cellular plan is absurdly cheaper in the US than a new account
2) there are small mobile service discounts for everything under the sun from employers to AAA
3) Comcast business costs about the same as XFinity internet in many metro areas and has SLAs in exchange for slightly slower speeds so don’t just rule it out if you’re a cable cutter.
4) Your ISP’s DNS servers- just don’t use them, not even once - there are a lot of alternatives and you should select one based on your threat model because they all have positives and serious negatives

• • •

Missing some Tweet in this thread? You can try to force a refresh
 

Keep Current with Lesley Carhart

Lesley Carhart Profile picture

Stay in touch and get notified when new unrolls are available from this author!

Read all threads

This Thread may be Removed Anytime!

PDF

Twitter may remove this content at anytime! Save it as PDF for later use!

Try unrolling a thread yourself!

how to unroll video
  1. Follow @ThreadReaderApp to mention us!

  2. From a Twitter thread mention us with a keyword "unroll"
@threadreaderapp unroll

Practice here first or read more on our help page!

More from @hacks4pancakes

13 Dec
In my life as a security professional, I have had exactly three IT friends / colleagues come up to me bragging about the secret digital surveillance they constructed to monitor their kids.

Every single one of them ultimately destroyed and lost their relationship with their kid.
It took so long to happen that despite my extreme discomfort with surreptitious monitoring and privacy invasions I chose to not question a parent as a non-parent. But over the course of a decade, every one of those kids either wrecked their life, or left home and never came back.
They always had this elaborate-sounding, techy panopticon. Some mix of cell location monitoring, fake social media accounts, web usage monitoring. I’ll never know how much the kids ever found out about in the end. The end result, however, was always the same.
Read 6 tweets
11 Dec
If I accomplish one thing in 2020 it will be to convince every infosec traveler without a pet because of travel to get an adorable and cuddly hamster. Welcome to hamster facts!
1) There are multiple types of hamsters. While dwarf hamsters can be more social, Syrian hamsters like Cassie are introverts prefer to only be friends with you, when they feel like it.
2) hamsters are very tidy desert animals, unlike rats and mice. In fast, most hamsters can be litter box trained in a day or two by simply putting a hamster sandbox in the corner they choose as a bathroom. They will also take adorable sand baths when the sand is clean.
Read 13 tweets
10 Dec
I don’t know who needs to hear this but a key part of finding a mentor is having a good pitch you can deliver about what you’re specifically trying to accomplish and where you want to go.
I don’t reality know how to answer, “Lesley will you be my mentor?”

I have limited bandwidth. What are you expecting from this relationship? Are you even trying to get into my field or area of expertise specifically? Is there someone else who would be better suited to help?
“Lesley, I’ve been studying ICS security and I am thinking about maybe doing so research on xyz but I need to flesh it out?” - I can work with that that, and I understand what you need. We can build a rapport.
Read 5 tweets
9 Dec
Any company that claims to have never suffered a successful intrusion either forges swords at the Renaissance faire with no digital devices, or has a SOC that’s missing stuff.

Or they’re outright full of crap.
I can’t believe I have to say this but the fact that everyone will eventually be hacked, at the same time, does not mitigate responsibility for reducing attack surface, building defense in depth, and performing good incident response. These aren’t mutually exclusive things.
Every intrusion is not the same. Every adversary is not the same.
Read 6 tweets
17 Nov
I’m really tired of explaining that hacking into an individual device in a complex physical process does not in most cases equate to successfully and meaningfully tampering with the process.
(Especially when it’s done on a table in a Village. Even though the research done there is incredibly important and meaningful.)
Anyway I have seen this for years when people gleefully found insecure HMIs on Shodan and now when people are drawing equivalence between voting machine vulnerabilities and successful election fraud.
Read 4 tweets

Did Thread Reader help you today?

Support us! We are indie developers!


This site is made by just two indie developers on a laptop doing marketing, support and development! Read more about the story.

Become a Premium Member ($3/month or $30/year) and get exclusive features!

Become Premium

Too expensive? Make a small donation by buying us coffee ($5) or help with server cost ($10)

Donate via Paypal Become our Patreon

Thank you for your support!

Follow Us on Twitter!